Now that we’ve setup the Mac to accept SSH connections securely using key authentication instead of passwords, what can you do with it?
This section will describe how to transfer files using a program like Transmit, controlling your home computer using VNC and routing traffic through the SSH tunnel to keep your information safe and protected [...]
This section will describe the process to create the encryption keys to replace the standard, insecure password authentication and how to setup port forwarding on your router.
Did you ever need to access your home or office computer while on the road? Concerned about security using public services? Now you can securely access your Mac from anywhere on the Internet using SSH and Public Key Authentication.